-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Secure Renegotiation (RFC 5746) Not supported / VULNERABLE (NOT ok)" is displayed even though renegotiation is not supported #2605
Comments
Please test my branch https://github.com/Tazmaniac/testssl.sh/tree/client-renego-refactoring Server which does not implement RFC 5746 could implement (insecure) client initiated renegotiation. So the two are not directly linked and should be independently tested. |
Ok I overlooked your report. I think you miss some points. Server initiated renegotiation may still be initiated and will be insecure without RFC 5746. |
@yuki-hirano-dev : A statement like "our server" but not handing over details about the server is like your grandma is telling you "my computer doesn't work". Therefore there's a section in the template which you omitted. Please disclose the IP here or send it to the contact in the template. |
Thank you for your kind comments.
I am sorry, but I cannot disclose the IP here.
Result: Expected Result:
I mean that "Secure Renegotiation (RFC 5746) Not supported." is OK, but "Secure Renegotiation (RFC 5746) Not supported / VULNERABLE (NOT ok)" is not OK when client/server initiated renegotiation is not supported by the server. In this case, no one can renegotiate in secure/insecure way so I thought "VULNERABLE (NOT ok)" is not correct.
I agree with you. I understand that it cannot be detected by client side(testssl.sh) so testssl.sh reports as "VULNERABLE (NOT ok)" on the safe side. |
Which version are you referring to
3.0.x or 3.2? (please check also how old your version is compare to the ones here)
3.2
what was happening
Our TCP server does not support Secure Renegotiation (RFC 5746) and never reply to renegotiation request.
So I think our TCP server is NOT VULNERABLE but detected as VULNERABLE (NOT ok) by testssl.sh.
TCP server's users may think that our TCP server is not secure and some of them will contact us to know whether this is vulnerable or not.
https://github.com/drwetter/testssl.sh/blob/b5ad5bd859357c8c0eaa986c1fb926bfb7c7df3d/testssl.sh#L17117
what did you expect ?
If the TCP server does not support Secure Renegotiation (RFC 5746) and never reply to renegotiation request then testssl.sh detects as "Secure Renegotiation (RFC 5746) Not supported / not vulnerable (OK)".
In this cace, I prefer that "Grade warning Secure renegotiation is not supported." message is not displayed.
The text was updated successfully, but these errors were encountered: